Using a Zero Trust Architecture to Help Prevent Ransomware

Logo
Presented by

John Bruggeman, virtual CISO, CBTS

About this talk

Zero trust is a strategy that defines how to architect your computer network and systems to protect and defend your data from attacks. It operates by assuming that computers, user accounts, software, and applications can be compromised at any time and implements continuous assessment of device posture, user credentials, and application integrity before granting access. Zero trust is not a SKU or a single product, rather it is a more secure way to provide access to data by implementing security controls on the end point, on the network, and in the cloud to ensure only authorized users and applications can access your data. Remember, the goal is to protect the data and make sure that it remains confidential, maintains integrity, and is available when needed. Tune into this this talk from industry thought leader John Bruggeman as he reviews zero trust at a high level and discuss what solutions you can implement to take advantage of this ransomware resistant strategy. Key takeaways regarding solutions for - End point protection. - End user authentication. - Network access controls. - Cloud posture management.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (784)
Subscribers (198222)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.